<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-pinkert-ippm-ip-measurement-option-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title>An IPv4 and IPv6 measurement option (MO) for hybrid flow measurements.</title>
    <seriesInfo name="Internet-Draft" value="draft-pinkert-ippm-ip-measurement-option-02"/>
    <author fullname="Tjeerd J. Pinkert">
      <organization>Siemens Mobility GmbH</organization>
      <address>
        <postal>
          <street>Ackerstrasse 22</street>
          <city>Braunschweig</city>
          <code>38126</code>
          <country>Germany</country>
        </postal>
        <email>tjeerd.pinkert@siemens.com</email>
        <uri>https://www.mobility.siemens.com</uri>
      </address>
    </author>
    <author fullname="Negar Masoudifar">
      <organization>Siemens Mobility GmbH</organization>
      <address>
        <postal>
          <street>Ackerstrasse 22</street>
          <city>Braunschweig</city>
          <code>38126</code>
          <country>Germany</country>
        </postal>
        <email>negar.masoudifar@siemens.com</email>
        <uri>https://www.mobility.siemens.com</uri>
      </address>
    </author>
    <author fullname="Akachukwu Adnife Nnamdi">
      <organization>Siemens Mobility GmbH</organization>
      <address>
        <postal>
          <street>Ackerstrasse 22</street>
          <city>Braunschweig</city>
          <code>38126</code>
          <country>Germany</country>
        </postal>
        <email>akachukwu.nnamdi@siemens.com</email>
        <uri>https://www.mobility.siemens.com</uri>
      </address>
    </author>
    <date year="2026" month="April" day="30"/>
    <area>OPS</area>
    <workgroup>IPPM Working Group</workgroup>
    <keyword>hybrid network measurements</keyword>
    <keyword>measurement data</keyword>
    <keyword>ip option</keyword>
    <abstract>
      <?line 127?>

<t>This document introduces an internet protocol (IP) measurement option (MO) that
contains information, normally not available to the receiver of IP packets, to
perform hybrid network measurements. In particular, measurements that need a
sender time stamp and a packet order number are then possible directly at the
receiver. The information contained in the IP MO can also be used by hosts
en-route to perform slightly more limited hybrid network measurements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dutchyatwork.github.io/rfc-draft-ip-measurement-option/#go.draft-pinkert-ippm-ip-measurement-option.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-pinkert-ippm-ip-measurement-option/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        IP Performance Measurement Working Group mailing list (<eref target="mailto:ippm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ippm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ippm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/DutchyatWork/rfc-draft-ip-measurement-option"/>.</t>
    </note>
  </front>
  <middle>
    <?line 137?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Hybrid network measurements on differentiated services (DS) microflows
<xref target="RFC2475"/>, following the IP performance metrics (IPPM) rationale outlined in
<xref target="RFC2330"/>, can be performed for a limited number of metrics without the need
for P-type packets. Using hybrid measurements, a complete characterisation of
an end-to-end path through the internet is not possible. Nevertheless, hybrid
measurements allow a measurement host to obtain important information about
the minimum or maximum quality (depending on the situation and metric) that
the network currently offers.</t>
      <t>The P-type packets used by, e.g., the one-way active measurement protocol
(OWAMP, <xref target="RFC4656"/>) and two-way active measurement protocol (TWAMP,
<xref target="RFC5357"/>), contain additional information that is needed for the calculation
of certain metrics. Two important pieces of information are the sequence
number and the timestamp, that are needed to calculate packet loss metrics and
packet delay metrics.</t>
      <t>To include such information in an IP packet, for measurement at the IP layer,
a suitable solution needs to be found. Since the data of IP packets is
determined by the upper stack configuration and the application protocol, the
only way is to include this information in the IP header. Fortunately, the
designers of the IPv4 and IPv6 protocols acknowledged the possibility of
inclusion of information for various purposes in the IP header as IP options.</t>
      <t>This document describes an IPv4 and IPv6 measurement option (MO) for the
measurement of packet loss, packet delay and other metrics that require a
sequence number and a timestamp from the sending host at the receiving host.</t>
    </section>
    <section anchor="justification-for-an-ip-measurement-option">
      <name>Justification for an IP measurement option</name>
      <t>In internetworks, the IP protocol is the unifying protocol in the network
stack. At the link layer various network technologies can be deployed that
are all capable of transporting IP packets. Although measurement techniques
and specifications are present for the lower layers, it is typically hard to
implement these such, that data from specific applications on a host can be
measured.</t>
      <t>Another concern is that, at the data link layer, each particular link layer
protocol adds protocol control information with a technology dependent amount
of data, to each IP packet. Therefore, measurements performed on various data
link layers cannot always be compared without assumptions.</t>
      <t>Typical internet applications use "sockets", a concept found in many of the
major operating systems, where both IP addresses, the transport protocol and
its port numbers are grouped. This is exactly the definition of a microflow.</t>
      <t>Nevertheless, transport layer protocols do typically not have the flexibility
to allow for measurements at the transport layer, since not all, or maybe even
least of the, transport protocols, include a sequence number and timestamp in
their data fragments. Also at the transport layer, the argument holds that
measurements are not necessarily comparable between different transport
protocols. In addition, a generic software, would also need adaptation for
each transport protocol, to perform (comparable) measurements when operating
higher up in the network stack.</t>
      <t>The IP protocol gets part of its flexibility from the capability of inserting
IP options into the IP header. Together with its unifying properties on
internet hosts, which allows comparison of measurement data among applications
and hosts, the network layer with the IP protocol forms the ideal place for
measurements, as acknowledged by the IPPM framework. The only downside of an
IP measurement option is that the IP header is enlarged. Adding slightly to
the amount of data sent through the network. In many cases this is offset by
the benefits of being capable of assessing the network quality at real-time.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in <xref target="BCP14"/> (<xref target="RFC2119"/>) (<xref target="RFC8174"/>) when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="metrics-for-the-ip-measurement-option">
      <name>Metrics for the IP measurement option</name>
      <t>The IP measurement option will be designed specifically for the following
metrics:
    - One-way Packet Delay, Mean Packet Delay, Packet Delay Variation,
    - One-way Packet Loss, Packet Reordering and Packet Duplication.</t>
      <t>The measurement option must be suitable for the measurement of microflows as
defined by <xref target="RFC2475"/> in the scope of DS. Microflows are identified by IP
source and destination addresses, the protocol id and transport layer source
and destination port numbers (when available). Measurements must be possible
between two end hosts on a point-to-point (P2P) IP link. Extension to multi-
point-to-multi-point links (MP2MP) should be possible. This requires that each
packet can be uniquely assigned to a microflow.</t>
      <t>In addition, it should be possible that hosts en-route, can use the IP MO to
measure or estimate the metrics on a microflow basis. Such measurements can
be done at boundary / gateway hosts of the network. One difficulty, in this
case, can be, that not all packets of a microflow must necessarily pass a
certain host, since paths through the network, for packets of the same micro-
flow, may differ.</t>
    </section>
    <section anchor="considerations-regarding-the-option-content">
      <name>Considerations regarding the option content</name>
      <t>Data rates and packet rates per microflow can be readily measured by source,
observer, and destination using a clock and the number of octets per microflow
traversing the network interface. These metrics do not need additional
information.</t>
      <section anchor="concerning-loss-reordering-and-duplicates">
        <name>Concerning loss, reordering and duplicates</name>
        <t>To measure packet losses, reordering and duplication, each packet must be
uniquely identifiable, and orderable, within the microflow. Only selected
transport layer protocols include such information, e.g., the TCP protocol.</t>
        <ul spacing="normal">
          <li>
            <t>The IP MO must include information to uniquely identify the position of each
IP packet in a stream of packets.</t>
          </li>
        </ul>
      </section>
      <section anchor="concerning-network-traversal-time-delay">
        <name>Concerning network traversal time (delay)</name>
        <t>To measure packet delay and other time-based properties of the network, the
time at the start of transmission (wire arrival time at the transmitting host)
and end of reception (wire exit time at the receiving host) of the IP packet
must be recorded. It is assumed in this document that hosts hosts have well
synchronised clocks. Clock synchronization is a topic that is addressed
abundantly elsewhere (<xref target="RFC2330"/>).</t>
        <t>The sending host records the start of transmission time, while the receiving
host records the end of reception time. In combination with the network
interface speed and the number of octets in the IP packet, the start of
reception time can be calculated at the receiving host. Note that the
receiving host can only timestamp at the end of reception, because only then
is clear that the packet has arrived complete and in good order.</t>
        <t>An exemption here can be hardware timestamp units that mark the start of
reception time. However, this time may include the store and forward time of
the input queue. With the wire arrival time at both hosts, the network delay
can be determined.</t>
        <t>The timestamps for start of transmission (transmission time stamp, TTS) and
start of reception (reception time stamp, RTS), as recorded in the host
software, may need correction to accurately represent the wire arrival times.
Such corrections are common in time transfer systems. The correction problem
however does not change the requirement that the wire arrival time of the
source needs to be sent to the receiver.</t>
        <ul spacing="normal">
          <li>
            <t>The IP MO must contain the wire arrival time of the sender.</t>
          </li>
        </ul>
      </section>
      <section anchor="concerning-microflow-identification">
        <name>Concerning microflow identification</name>
        <t>Although it is assumed that microflows form a single data stream, this must
not be the case. Consider a user of a computer starting and stopping a group
of network programs at the same port, contacting the same destination host at
the same port with the same protocol. It is now unclear, since multiple
programs were used, if the measured data should be grouped in one measurement
or not. Another use case is that where the higher layer protocols do not
contain port numbers in the "classical" sense (classical transport protocols
are UDP, TCP and other internet transport protocols).</t>
        <t>This ambiguity is resolved by the inclusion of a flow label in the IPv6
protocol. A unique flow identifier is assigned, by the sending host, to
packets belonging to the same microflow.</t>
        <ul spacing="normal">
          <li>
            <t>The IPv4 MO must contain a flow identifier in equivalence to the
IPv6 protocol.</t>
          </li>
        </ul>
      </section>
      <section anchor="concerning-packet-selection-for-measurement">
        <name>Concerning packet selection for measurement</name>
        <t>To apply "alternate marker" methods <xref target="RFC9341"/>, there must be a way to apply
a (single bit) marker in the IP header. This can be done using the DSCP
<xref target="RFC2474"/> field of the IP packet, and alternating two code points while
keeping the transport properties for both code points equal, or by abusing
the single bit that is still free in the CU fields specified in <xref target="RFC2474"/>.
The first would need broader support to implement the method, the latter
would void the internet standards. Notably the ECN <xref target="RFC3168"/> and L4S
specifications <xref target="RFC9330"/>, <xref target="RFC9331"/>, <xref target="RFC9332"/> that uses these bits.</t>
        <ul spacing="normal">
          <li>
            <t>The MO must contain a marker to enable the use of alternate marker methods.</t>
          </li>
        </ul>
        <t>Another consideration is that measurement software may not be capable of
processing all packets on high-speed interfaces. In this case, either layer 3
hardware support would be needed, or statistics could be gathered on only a
fraction of the packets that are sent. In the latter case it would be
unfavourable to apply an MO only to the packets that should be measured,
because network components may react differently on packets of different
lengths, and, potentially, on packets with different header lengths.</t>
        <ul spacing="normal">
          <li>
            <t>The MO must contain a marker to signal which packets shall be used to
calculate metrics on.</t>
          </li>
        </ul>
      </section>
      <section anchor="concerning-integrity-of-measurement-data">
        <name>Concerning integrity of measurement data</name>
        <t>Since the network traffic with IP measurement options included may pass
network nodes that are owned by foreign entities, the IP measurement option
must be protected against manipulation. One way to do this is to include a
digital signature into the MO option. Another way to do this is to encrypt the
contents of the measurement option for all hosts that should not read its
contents.</t>
        <ul spacing="normal">
          <li>
            <t>The MO must contain the possibility to include a cryptographic signature.</t>
          </li>
          <li>
            <t>Encryption of the MO contents, potentially including a cryptographic
signature, must be possible.</t>
          </li>
        </ul>
      </section>
      <section anchor="concerning-fragmentation-of-ip-packets">
        <name>Concerning fragmentation of IP packets</name>
        <t>Fragmentation of IP packets works as follows. The IP header of a packet that
needs fragmentation, is copied into each fragment. The data of the IP packet
is cut into slices, and each slice is added to a new fragment. Then the more
fragments flag and the fragment offset fields are set / updated. The more
fragments flag is set to zero on the last fragment.</t>
        <t>The identifier field is used to distinguish fragments of more than one
package. The sending host must ensure that the same identifier value is not
reused when packets can still be under way in the network (network timeout,
255 seconds). Due to this reason, modern layer 4 protocols, notoriously the
TCP protocol try to avoid that IP packets are fragmented, since only 64k
fragments can be underway in an IP network at the same time. It can be
understood that with the current higher speed network interfaces, this poses a
limitation on the data throughput possible for a single microflow.</t>
        <t>Nevertheless it is good practice to consider fragmentation in the design of an
IP measurement option. The specification of IPv4 options provides the copy
flag, that allow an option to be present in the first fragment only, or to
copy it into all fragments.</t>
        <t>Since our IP measurement option could still be used to obtain information on
the network performance by hosts enroute, when it is present on fragments of
an IP datagram, it would be favourable to copy the data of the IP measurement
option into each fragment.</t>
        <ul spacing="normal">
          <li>
            <t>The IP MO must be included in all fragments of an IP datagram.</t>
          </li>
        </ul>
        <t>Fragments of a datagram can be identified by the identifier, fragmented flag,
and the contents of the fragment offset field. This may help enroute hosts
to interpret "the same" IP measurement option as not belonging to a packet
duplicate. This also allows to measure fragment duplications both on the
enroute host, as well as on the receiving host, that can be introduced as
measurement additions. In this way fragment delay, loss, reordering or
duplication statistics can be determined in addition.</t>
        <t>The main measurements are to be performed on the source and destination hosts
before fragmentation is performed and after re-assembly of fragments. This
also means that measurements by systems "on the path" may yield different
results than those on the end systems, unless they are capable of marking
whether all fragments have passed such a system.</t>
        <t>Since IPv4 packets, in contrast to IPv6 packets, can be fragmented by hosts
enroute, fragmentation statistics may differ for various network segments.</t>
      </section>
    </section>
    <section anchor="determination-of-the-properties-of-the-option-content">
      <name>Determination of the properties of the option content</name>
      <t>In this section the contents of the MO determined above is specified
specifically, based on the available technology and boundaries of the
possibilities that an IP option offers. The following items were identified.</t>
      <ul spacing="normal">
        <li>
          <t>The IP MO must contain the wire arrival time of the sender.</t>
        </li>
        <li>
          <t>The IP MO must include information to uniquely identify the position of each
IP packet in a stream of packets.</t>
        </li>
        <li>
          <t>The IPv4 MO must contain a flow identifier in equivalence to the
IPv6 protocol.</t>
        </li>
        <li>
          <t>The MO must contain a marker to enable the use of alternate marker methods.</t>
        </li>
        <li>
          <t>The MO must contain a marker to signal which packets shall be used to
calculate metrics on.</t>
        </li>
        <li>
          <t>The MO must contain the possibility to include a cryptographic signature.</t>
        </li>
        <li>
          <t>Encryption of the MO contents, potentially including a cryptographic
signature, must be possible.</t>
        </li>
        <li>
          <t>The IP MO must be included in all fragments of an IP datagram.</t>
        </li>
      </ul>
      <section anchor="current-state-of-the-art-technology">
        <name>Current state of the art technology</name>
        <t>The fastest data links today measure 1 Tbit/s per channel or more <xref target="Nokia"/>. It
is assumed that 10 Tbit/s data link technology will become feasible in the
near future. Links based on <xref target="IEEE802.3"/> Ethernet have a minimum frame size of
46 octets and a packet size of 72 octets. A 12 octets inter-frame gap must be
added. The time to send the data on a 10 Tbit/s link can now be calculated.
The number of bit times for one frame is 672. Each bit takes 0.1 picoseconds
to send, therefore sending the minimum length frame takes 67.2 picoseconds.</t>
        <t>On a 1 Pbit/s link, under the assumption that Ethernet frames are used, the
time to send one minimum-length frame would be 0.672 picoseconds. At the
latter rate, approx. 1488.1 Ethernet packets can be sent in 1 nanosecond.</t>
        <t>At the network layer, the maximum datagram lifetime (MDL) of IP packets of
is approximately 120 seconds <xref target="RFC6864"/>.</t>
        <t>The IPv4 protocol allows an IP header length of 15 * 32 bits. 10 * 32 bits are
available for IP options. This is a total of 40 octets of which 38 can be used
for user content.</t>
        <t>The IPv6 protocol allows for 258 octet options of which 256 can be used for
user contents.</t>
        <t>Regarding time transfer techniques, two standards exist. The <xref target="IEEE1588-2019"/>
precision time protocol version 3 (PTPv3) is concipated to work with Ethernet,
the IPv4 and IPv6 protocols, and the UDP protocol. The network time protocol
version 4 (NTPv4) <xref target="RFC5905"/> is used in the scope of IPv4 and IPv6. The PTP
protocol favours integer calculation, while the NTP protocol favours binary
floating point calculations.</t>
        <t>Time in the Linux OS kernel is delivered in nanoseconds resolution by the
kernel interface. Time of the MAC OS X mach microkernel is delivered with
nanosecond resolution as well. Time of the Windows kernel is delivered with a
100 nanosecond resolution.</t>
      </section>
      <section anchor="wire-arrival-time-of-the-sender">
        <name>Wire arrival time of the sender</name>
        <t>The sender wire arrival time of the IP packet must be included in the IP
option, such that the receiver can calculate the packet delay based on the
receiver wire arrival time of the IP packet. Alternatively, both sender and
receiver could send the wire arrival time to a third party that can then
calculate the packet delay.</t>
        <t>For the definition of time the major question is which resolution is
sufficient. The next question is that of the calculator system. Is calculation
done in integer of floating-point arithmetic. Integer calculation can be done
on most machines, floating point arithmetic is expensive, both in hardware as
well as in software when emulated.</t>
        <t>Both in the NTP as well as the PTP protocol, the coarse timescale is kept in
seconds from the epoch. The PTP protocol reserves 48 bits for the coarse
timescale, the NTP protocol at least 32 bits, with the possibility of
extending to 64 bits (the latter is more than enough for all practical
purposes). The 16-bit format is typically only used for time differences.</t>
        <t>It must be noted that, since the maximum datagram lifetime of an IP packet is
120 seconds, together with the fact that clocks in modern systems are
synchronized with one second accuracy, the 7 least significant bits of the
second counter of the 32- or 48-bit second counter, related to the epoch,
should normally suffice to uniquely complete the timestamp based on the second
counter of the receiver clock. Under the assumption that normal IP connections
are lost within 255 seconds (TTL reduced to 0) an 8-bit seconds counter would
suffice, it is mentioned in <xref target="RFC6864"/> that this is not always the case. To
account for links where higher MDLs are possible an arbitrary number of bits
could be added to this number. A 12-bit seconds counter would allow to
identify delayed packets uniquely up to 1 hour with clock deviations on the
systems of up to 150 seconds. This seems sufficient for most earth based
purposes.</t>
        <t>Only when the need to account for (inter)stellar applications arises, transfer
of a larger part of the second counter would be needed. A 32-bit seconds
timestamp allows for link delays of 136 years, which is sufficient for delay
measurements for space travel within the solar system.</t>
        <t>The fractional part of the second is encoded as a number of fractions in the
NTP protocol. Each fraction is 2^(-N) long, where N is the number of bits used
to encode the fractional seconds. NTP allows 16, 32 or 64 bits fractional
seconds. The PTP protocol, on the other hand, encodes the fractional seconds
part as a 32-bit number representing the number of nanoseconds in the
fraction. Since most binary floating-point numbers have no exact match when
converting to decimal floating-point numbers, rounding errors must occur when
converting back and forth between NTP and PTP fractions. Reasons why to choose
one format over the other must thus come from elsewhere.</t>
        <t>A reason to favour the NTP format, may lie in the simplicity of certain
calculations. Conversions between 16-, 32-, and 64-bit values can be performed
by efficient bitshift operations. Adding and subtracting is also simply
possible. A potential drawback are that rounding errors to nanoseconds exist,
and those may not be distributed evenly. This may prevent the use of accurate
high resolution measurements, where rounding errors may become significant.</t>
        <t>One reason to favour the PTP format, which counts the fraction of time in an
integer number of nanoseconds, lies in the field of frequency metrology. Many
physical clocks count time based on a 10 MHz, 100 MHz, 1 GHz or even 10 GHz
oscillator. These frequencies can be expressed as powers of 10 of a
nanosecond. In addition, calculations in nanoseconds have a more natural feel
than those in, e.g., 2^(-32) = 232.8... picosecond units. Other arguments are
that PTP implementations often feature accurate hardware timestamping units,
and that all major operating systems deliver time in nanoseconds. Therefore
the fractional seconds will be represented in nanoseconds.</t>
        <t>Due to the technical restrictions of an IP option, the format for the
timestamp must be chosen in a clever way. To represent one second in
nanoseconds, 30 bits are sufficient. It is proposed to take the thirty least
significant bits of a 32-bit word for this. Reserving the two most significant
bits for other purposes. For the seconds part of the timestamp, 7 transferred
bits are sufficient to reproduce the sender timestamp on the receiver, it
would make sense to transfer at least an octet second part. The additional
number of seconds may be used to relieve the requirement on the time
synchronization of the two systems in use.</t>
        <ul spacing="normal">
          <li>
            <t>For the IP measurement option, the PTP Timestamp format will be used as the
basis for both seconds and nanoseconds. The least significant bits of the
seconds field will be used in the IP measurement option.</t>
          </li>
        </ul>
      </section>
      <section anchor="unique-packet-identifier">
        <name>Unique packet identifier</name>
        <t>The classical means of determining whether packets are sent in order, is by
use of a counter that increments upon sending of each subsequent packet.</t>
        <t>As discussed in 5.2 each packet will be marked with a sender timestamp with ns
resolution. On 10 Gbit/s links, sending one minimum size frame takes 67.2 ns.
Therefore, the timestamp alone suffices to uniquely order packets sent on links
up to 100 Gbit/s (6.72 ns / frame). At higher link speeds, an additional
numerator can be used to subdivide the timestamp. For a 1 Pbit/s link, a
numerator that is capable of counting to 1489 is sufficient to uniquely
numerate ethernet frames and thus IP packets. This requires at least an 11 bit
counter.</t>
        <t>The IP ID field seems a good numerator candidate for counting datagrams, but
it is currently specified to be solely used for fragmentation and reassembly
by <xref target="RFC6864"/>. Therefore, it is not suitable for measurement purposes (it is
always zero for unfragmented packets) also because some sources do not vary
the ID at all.</t>
        <t>Duplication detection may be based on hashes <xref target="RFC6621"/>, but loss and
reordering measurements are not possible when higher protocol layers lack
information to detect these. This is e.g. the case with UDP. A timestamp can
thus not replace a numerator field, since it does not show whether packets are
missing, even on slow links.</t>
        <t>A unique packet identifier of at least 12 bits is therefore recommended. Only
on very fast links problems may occur when the counter overflows and multiple
packet have the same timestamp and unique packet identifier.</t>
      </section>
      <section anchor="flow-identifier">
        <name>Flow identifier</name>
        <t>The last bit of contents that may be needed for transport layer-less
protocols is a definition of a microflow identifier. For most current day
protocols there are 16-bit port numbers specified for source and destination
ports. This would call for a 32-bit source/destination flow field. On the
other hand, there are very few protocols without a transport layer. The IP
packet definition allows only 256 of them, defined by the protocol byte.
For outgoing flows, a host can only open 2^16 ports, so a 16-bit flow
identifier for transport-less protocols suffices from this perspective.</t>
        <t>The IPv6 protocol <xref target="RFC8200"/> specifies a 20-bit flow label. Defining 20 bits
for the flow label allows unification of its use with IPv6 <xref target="RFC8200"/>.</t>
        <t>It must be noted that flow labels and the IP options are not protected against
unwanted modifications and are for measurement purposes only. Transport-less
protocols can open multiple data flows based on higher level protocols (e.g.
application protocol). It is advised to generate flow labels stateful
according to <xref target="RFC6437"/>. For compatibility reasons this will be the course of
action for the IPv4 option.</t>
      </section>
      <section anchor="alternate-marker">
        <name>Alternate marker</name>
        <t>Hybrid measurements may be done using an alternate marker method such as
specified in <xref target="RFC9341"/>. The measurement option could be a way to include such
a marker independent from, e.g., an alternating DSCP. Therefore, at least one
bit must be reserved as alternating marker bit.</t>
      </section>
      <section anchor="include-in-calculation-marker">
        <name>Include in calculation marker</name>
        <t>Since switches and routers may have differentiating behaviour when packet
sizes differ, the same packet with and without the IP measurement option could
be treated differently. To allow for unbiased measurements, even when only
fractions of the packets of a microflow are to be included in measurements,
the packets that are not to be measured on, must be of the same length. This
means that a dummy measurement option must be included in the IP header in
this case. At least one bit must be reserved as "include in calculation" bit,
to allow the receiver to decide whether to include a packet in the
measurements or not.</t>
      </section>
      <section anchor="security-measures">
        <name>Security measures</name>
        <t>There are reasons to apply security measures to this data in the packet
header. Since the IP measurement option can be used to verify an SLA / SLS,
there may be monetary reasons to falsify the information in the packet, to
make the measurement system think that all is fine on the network. E.g.,
forging of the timestamp by the last switch in the path may make the receiver
think that the packet delay was less than it actually is.</t>
        <t>There are multiple scenarios thinkable how IT security measures are applied
to the IP measurement option.</t>
        <ol spacing="normal" type="1"><li>
            <t>Proof of integrity of the IP measurement option, while keeping the content
available for third parties to use.</t>
          </li>
          <li>
            <t>Encryption of the contents of the IP measurement option to hide the content
for third parties.</t>
          </li>
        </ol>
        <t>Since the IP header, including the IP measurement option can be freely
manipulated by hosts en-route, it is not possible to avoid that hosts may
remove the IP measurement option entirely. All fields that need to be
manipulated are easily adapted. An end-host may know that the IP measurement
option has been removed, by being configured to expect the IP MO on certain
connections with other hosts and not receiving any. The configuration can be
static or dynamic, e.g., by means of a measurement management protocol. Such
protocols would need definition in a separate RFC.</t>
        <t>To ensure the integrity of the IP measurement option, a cryptographic
signature can be used. It could be added as additional bytes to the IP
measurement option. A HMAC or a hash of the signature can be added when
symmetric keys are used. The latter has the advantage that the space needed to
add the hash can be limited, e.g., by including only the first x octets of the
full hash. It is quite expensive to add a full public/private key signature.</t>
        <t>Upon signing an option, hosts that know the appropriate keys can verify the
data in the IP measurement option. Depending on the type of signature used, it
may be possible for hosts to change the option content and resign. It must,
therefore, be ensured that, for such types of signatures, only trusted hosts
obtain the keys. One indication of the presence of a signature is the length
of the option. Hosts involved in verifying options before making measurements
should however rely on other sources to determine if they expect signed
measurement options. In this case they may also reliably detect removal of
signatures, which is easily possible.</t>
        <t>Fragmentation must be taken into account, and data in the IP header that is
required for fragmentation and defragmentation may be changed by systems "on
the path". It can therefore not be used as input for cryptographic signatures.</t>
        <t>To perform various measurements the signature must be made over a pseudo
header including the following data:
1. IP version
2. IP internet header length (Fixed value, 10 words)
3. IP total length (Payload length)
4. IP protocol type (Next header field)
4a. (Flow Label)
5. IP source address
6. IP destination address
7. IP measurement option, including:
    a. IP option type
    b. IP option length
    c. IP measurement option data excluding the signature / signature hash.
8. Hash over the IP packet data. (Hash over Payload)</t>
        <t>The fields in the pseudo header are composed as follows for the IPv4 protocol:</t>
        <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |Version|  IHL  |          Total Length         |    Protocol   |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                       Source Address                          |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                    Destination Address                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 .                                                               .
 .                   IP measurement option                       .
 .                                                               .
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                  Hash over IP packet data                     |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The fields in the pseudo header are composed as follows for the IPv6 protocol:</t>
        <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |Version|1 0 1 0|         Payload Length        |  Next Header  |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |               Flow Label              |       Reserved        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                                                               +
 |                                                               |
 +                       Source Address                          +
 |                                                               |
 +                                                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                                                               +
 |                                                               |
 +                    Destination Address                        +
 |                                                               |
 +                                                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 .                                                               .
 .                   IP measurement option                       .
 .                                                               .
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                     Hash over Payload                         |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The hash over the IP packet data (Payload) ensures that port numbers are
always included when present, independent of the higher layer protocol, since
it is favoured to make the implementation independent from possible higher
layer protocols. The requirement on the hash over the IP packet data is that
it can be quickly calculated, and that spoofing the data takes, on average,
more time than the network timeout. Alternatively, a cryptographic hash, using
a private key, may be derived over the pseudo header and the IP packet data
(Payload). Note that the length of the hash must not be limited to 32 bits.</t>
        <t>If cryptographic encryption is feasible given the maximum length of 40 octets
(320 bits) of the IP MO, should be determined elsewhere. Also, which algorithms
to use are not part of this specification. In any case it would be proper that
untrusted hosts on the path know that options are encrypted, and cannot be
used to perform measurements. Therefore, a way to determine whether, or not, an
encrypted measurement option is used must be present. It is proposed to use
the option type for these purposes.</t>
        <t>In all cases the generation and distribution of cryptographic keys is
performed by use of a secure key distribution protocol, that is not part of
this specification. This protocol must be capable of generating keys for each
distinguishable microflow to perform signing or encrypting the IP measurement
option data.</t>
        <t>The possibility of signed and encrypted IP measurement options is indicated in
this RFC, but no particular specification is given yet. Such specifications
are to be subject of RFCs to be written, as are the specifications for
measurement management protocols.</t>
      </section>
    </section>
    <section anchor="ipv4-option-definition">
      <name>IPv4 option definition</name>
      <t>The maximum length of an IPv4 option is ten 32-bit words, or 40 octets, see
<xref target="RFC791"/>. An IPv4 option always includes the option type. The length octet is
always present for IPv4 options with more than only the option type. The IPv4
measurement option is therefore defined as follows.</t>
      <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |  Option Type  | Option Length |             UID               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |               Flow Label              |         Seconds       |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |I A|                   Nanoseconds                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                                                               +
 |                                                               |
 +               (Optional) Cryptographic Signature              +
 |                                                               |
 +                                                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      <t>Option Type: 8 bits</t>
      <ul empty="true">
        <li>
          <t>The IP measurement option is a debugging and measurement option, and must be
present in each fragment of an IP datagram. Two option types are requested,
one for non-encrypted options, with or without signature, and one for
encrypted options, that can only be read by systems on the path that belong
to the trusted group of measurement clients.</t>
          <t>The option may be skipped over if the Option Type is unknown, and the option
data does not change en-route.</t>
          <ul spacing="normal">
            <li>
              <t>Bit  8   (copied flag)   : 1 = copied</t>
            </li>
            <li>
              <t>Bit  6-7 (option class)  : 2 = debugging and measurement</t>
            </li>
            <li>
              <t>Bits 1-5 (option number) : 26 = Unencrypted Measurement Option (UMO),
                                                 to be assigned by IANA</t>
            </li>
            <li>
              <t>Bits 1-5 (option number) : 27 = Encrypted Measurement Option (EMO),
                                                 to be assigned by IANA</t>
            </li>
          </ul>
          <t>Value becomes 218 and 219</t>
        </li>
      </ul>
      <t>Option Length: 8 bits</t>
      <ul empty="true">
        <li>
          <t>The length of the IP measurement option in octets, including length of the
cryptographic signature when present. For an encrypted and signed
measurement option, all octets are included in the length.</t>
        </li>
      </ul>
      <t>Unique Identifier (UID): 16 bits</t>
      <ul empty="true">
        <li>
          <t>The Unique Identifier is incremented for each sent IP packet. This allows
the receiving host to identify packet losses, duplications and re-orderings.
It must be noted that each fragment of a fragmented datagram contains a copy
of the IP measurement option. Therefore systems "on the path" should rely,
e.g., on the fragment offset to perform such measurements. End-hosts perform
measurements on the packet before fragmenting and after re-assembly.</t>
        </li>
      </ul>
      <t>Flow Label: 20 bits</t>
      <ul empty="true">
        <li>
          <t>The Flow Label as specified in the IPv6 standard <xref target="RFC8200"/>.</t>
        </li>
      </ul>
      <t>Seconds: 12 bits</t>
      <ul empty="true">
        <li>
          <t>The 12 least significant bits of the seconds field of the PTP Timestamp.</t>
        </li>
      </ul>
      <t>Usage Flags: 2 bits</t>
      <ul empty="true">
        <li>
          <t>The Usage Flags indicate how the option can be used by the receiving host.</t>
          <ul spacing="normal">
            <li>
              <t>Bit 0: 0 = Dont include in measurement', 1 = Include in measurement</t>
            </li>
            <li>
              <t>Bit 1: Alternate Marker</t>
            </li>
          </ul>
          <t>The I(nclude in measurement) flag signals whether or not the IP measurement
option contains real data. Sending empty data (all 0) may be done to relieve
computational efforts of the sending systems under high data traffic loads,
while keeping the IP header size equal for all IP packets. For signed
connections the cryptographic signature must also be applied on "empty" IP
measurement options, since spoofing would otherwise be possible.</t>
          <t>The A(lternate Marker) can be used to implement alternate marker measurement
methods. Alternate marker methods using this IP measurement option, must
specify how they use this bit.</t>
        </li>
      </ul>
      <t>Nanoseconds: 30 bits</t>
      <ul empty="true">
        <li>
          <t>The nanoseconds field contains the number of nanoseconds of the timestamp.
When a system is not capable of providing timestamps with nanosecond
resolution, the highest resolution that can be provided is used and the
other digits of the nanosecond field are set to 0. When a system uses, e.g.,
a 16-bit subdivision of one second (such as NTP timestamps may), the decimal
value is rounded to the nearest nanosecond. Adding or subtracting a certain
random number of nanoseconds to the result may be used to prevent rounding
bias. This is up to the implementer of the IP measurement option for a
system, but must be documented.</t>
        </li>
      </ul>
      <t>(Optional) Cryptographic Signature:</t>
      <ul empty="true">
        <li>
          <t>Optionally up to 7 words, 28 octets, or 224 bits can be used for the
transmission of a cryptographic signature.</t>
        </li>
      </ul>
      <t>The option order has been chosen such that when this option is the first
option, the data aligns in the IP packet, hopefully resulting in an efficient
processing in host systems, which would be needed on high-speed links. No
EOOL option is needed when this option is the only one <xref target="RFC791"/>,
<xref target="IANA-IP-Option-Numbers"/>.</t>
      <t>When the option is encrypted only the first two octets have their normal
meaning. The rest of the octets form the ciphertext.</t>
    </section>
    <section anchor="ipv6-option-definition">
      <name>IPv6 option definition</name>
      <t>The maximum length of an IPv6 Hop-by-Hop Option is 255 octets, see <xref target="RFC8200"/>.
An IPv6 option always includes the option type, and length octet. The IPv6
measurement option will be defined as follows.</t>
      <artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |  Option Type  | Option Length |           Seconds             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |I A|                   Nanoseconds                             |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                              UID                              |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 +                                                               +
 |                                                               |
 +               (Optional) Cryptographic Signature              +
 |                                                               |
 +                                                               +
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      <t>Option Type: 8 bits</t>
      <ul empty="true">
        <li>
          <t>The IP measurement option is a debugging and measurement option, and must be
present in each fragment of an IP datagram. Two option types are requested,
one for non-encrypted options, with or without signature, and one for
encrypted options, that can only be read by systems on the path that belong
to the trusted group of measurement clients.</t>
          <t>The option may be skipped over if the Option Type is unknown, and the option
data does not change en-route.</t>
          <ul spacing="normal">
            <li>
              <t>Bit  8   (copied flag)  : 1 = copied</t>
            </li>
            <li>
              <t>Bit  6-7 (option class  : 2 = debugging and measurement</t>
            </li>
            <li>
              <t>Bits 1-5 (option number): 26 = Unencrypted Measurement Option (UMO),
                                             to be assigned by IANA</t>
            </li>
            <li>
              <t>Bits 1-5 (option number): 27 = Encrypted Measurement Option (EMO),
                                             to be assigned by IANA</t>
            </li>
          </ul>
          <t>Value becomes 218 and 219</t>
        </li>
      </ul>
      <t>Option Length: 8 bits</t>
      <ul empty="true">
        <li>
          <t>The length of the IP measurement option in octets, including length of the
cryptographic signature when present. For an encrypted and signed
measurement option all octets are included in the length.</t>
        </li>
      </ul>
      <t>Seconds: 16 bits</t>
      <ul empty="true">
        <li>
          <t>The 16 least significant bits of the seconds field of the PTP Timestamp.
When the IPv4 algorithms are used for calculations, the four most
significant bits of the Seconds field may be skipped.</t>
        </li>
      </ul>
      <t>Usage Flags: 2 bits</t>
      <ul empty="true">
        <li>
          <t>The Usage Flags indicate how the option can be used by the receiving host.</t>
          <ul spacing="normal">
            <li>
              <t>Bit 0: 0 = Dont include in measurement', 1 = Include in measurement</t>
            </li>
            <li>
              <t>Bit 1: Alternate Marker</t>
            </li>
          </ul>
          <t>The I(nclude in measurement) flag signals whether or not the IP measurement
option contains real data. Sending empty data (all 0) may be done to relieve
computational efforts of the sending systems under high data traffic loads,
while keeping the IP header size equal for all IP packets. For signed
connections the cryptographic signature must also be applied on "empty" IP
measurement options.</t>
          <t>The A(lternate Marker) can be used to implement alternate marker measurement
methods. Alternate marker methods using this IP measurement option, must
specify how they use this bit.</t>
        </li>
      </ul>
      <t>Nanoseconds: 30 bits</t>
      <ul empty="true">
        <li>
          <t>The nanoseconds field contains the number of nanoseconds of the timestamp.
When a system is not capable of providing timestamps with nanosecond
resolution, the highest resolution that can be provided is used and the
other digits of the nanosecond field are set to 0. When a system uses, e.g.,
a 16-bit subdivision of one second (such as NTP timestamps may), the decimal
value is rounded to the nearest nanosecond. Adding or subtracting a certain
random number of nanoseconds to the result may be used to prevent rounding
bias. This is up to the implementer of the IP measurement option for a
system, but must be documented.</t>
        </li>
      </ul>
      <t>Unique Identifier (UID): 32 bits</t>
      <ul empty="true">
        <li>
          <t>The Unique Identifier is incremented for each sent IP packet. This allows
the receiving host to identify packet losses, duplications and re-orderings.
It must be noted that each fragment of a fragmented datagram contains a copy
of the IP measurement option. Therefore systems "on the path" should rely,
e.g., on the fragment offset to perform such measurements. End-hosts perform
measurements on the packet before fragmenting and after re-assembly.
Note that the 16 least significant bits of the UID can be used with the IPv4
algorithms, since they roll over in similar fashion. The full 32-bit UID has
relevance on very fast IPv6 links.</t>
        </li>
      </ul>
      <t>(Optional) Cryptographic Signature:</t>
      <ul empty="true">
        <li>
          <t>Optionally up to 63 words, 252 octets, or 2016 bits can be used for the
transmission of a cryptographic signature.</t>
        </li>
      </ul>
      <t>As the flow identifier is an integral 20-bit field in the IPv6 header it is
not included in the IPv6 measurement option. When the option is encrypted only
the first two octets have their normal meaning. The rest of the octets form
the ciphertext.</t>
      <t>This option shall be aligned in a 4n fashion.</t>
    </section>
    <section anchor="using-the-ip-measurement-option">
      <name>Using the IP measurement option</name>
      <t>The IP MO was defined to enable the hybrid measurement of various statistics
on Diffserv microflows <xref target="RFC2474"/>. Amongst others these are:
- One-way Packet Delay, Mean Packet Delay, Packet Delay Variation and related
  statistics.
- Packet Losses, Reordering and Duplication</t>
      <t>The first goal is to measure such statistics on microflows <xref target="RFC2474"/> between
two end hosts at a point-to-point (P2P) IP link. The statistics can of course
be extended to multi-point-to-multi-point (MP2MP) links. This requires that
the packets can be uniquely assigned to a microflow at the IP layer and that
all properties needed to perform the measurements must be available either by
a statistics collector or by the destination host(s). It is assumed that each
microflow is assigned a unique flow identifier by the source host. This means
that each connection has two microflows, each with its own flow identifier.</t>
      <t>A second goal is that hosts en route, can try to measure or estimate the
measurands on a microflow basis. The difficulty here is that not all packets
must pass a certain host on the route. Nevertheless, useful information can be
obtained from the estimations made by on route hosts. E.g. the fraction of
the traffic traversing certain routes A, B, or C.</t>
      <t>As explained, timestamps upon transmission and reception are needed to perform
delay measurements and their related measurants. To perform packet loss and
related measurements an incrementing numeration counter is needed (NUM).</t>
      <section anchor="measurement-procedure-on-the-end-hosts">
        <name>Measurement procedure on the end hosts</name>
        <t>It is more or less assumed that microflows belong to a pair of sockets on the
source and destination hosts. The operating system (OS) makes counters
available that can be used by polling or (when a fancier way is needed) by
an interrupt mechanism. Such interrupts can come at a programmable time, e.g.
every second. This time interval will be termed measurement interval (MI).
Since the OS has the timers, this seems a logical scheme. The presence of the
MO may trigger the calculation of the various statistics, this can be a
configuration option.</t>
        <t>Hosts can make two queues available to user space programs where the outgoing
and incoming IP headers of each flow are queued for user space analysis. For
incoming packets the reception timestamp is also inserted in this queue.</t>
        <t>It must however be considered that the statistics are only reliable after the
maximum packet delay (MPD) of the system, known to the operator, has expired.
This MPD must thus be configurable but may be set to a default value of 120
seconds. It is advised to make these settings configurable for per microflow
at the destination host. It is advised that each MI becoming available after
MPD is tagged with the start time of the interval at the TAI timescale
<xref target="IEEE1588-2019"/> also used in the MO tagged packets.</t>
        <t>Delay and its related metrics can be readily determined when the destination
host knows the time when the packet was sent. The source time stamp is
included in the MO option. If no packets are lost delay statistics can be
presented immediately to the user.</t>
        <t>Losses can be calculated when the packet counters on the source and
destination are compared, but also when the destination knows which packets
were lost. The packet number (NUM) is therefore included in the MO together
with the time stamp.</t>
        <t>When an IP packet is created the space for an MO is reserved in the packet's
option header and is indicated with a pointer in memory. The flow label can
be inserted readily. Just before transmission of the first octet of the IP
packet a timestamp is retrieved from the OS kernel (transmission time stamp
TTS) and inserted into the IP packet. The colouring counter NUM is inserted
and increased. The packet is then transmitted by the OS. After transmission
the kernel updates the kernel counters for transmission. It may, but must
not, make the IP header available for analysis by forwarding it to a queue
that can be read by user space programs.</t>
        <t>The receiving host has memory reserved for a timestamp and the data of an
incoming IP packet header. When the receiving host sees that an IP packet
carries the MO option, it generates a timestamp (reception time stamp RTS)
when the last octet of the packet has been received. When the completeness
of the packet has been verified (checksums), the MO data and the RTS are used
to update the kernel statistics. The system may also make the IP header and
the RTS available for analysis by forwarding it to a queue that can be read
by user space programs.</t>
        <t>At the receiving host the following data are used to indicate the flow:
- source IP address
- destination IP address
- flow ID</t>
        <t>Normally a microflow would be known based on the protocol ID and source and
destination ports, these can still be used for backward compatibility or
to calculate metrics on microflows that do not carry the MO option. Thoughts
on raw data formats for statistical analysis by a data collection system are
given in Notes for raw metering protocols.</t>
      </section>
      <section anchor="measurement-procedure-at-observers">
        <name>Measurement procedure at observers</name>
        <t>Each switch with deep packet inspection capabilities, each router and host
observing IP packets with an MO option can generate a RTS upon complete
reception. Statistics can now be calculated for each microflow. However, care
must be taken when interpreting these statistics, but they may be useful for
network fault analysis. In the remainder of this section the possibilities
and limitations for measurements made by observers will be discussed.</t>
        <t>The observation on the MPD for end hosts, also holds for observing hosts.
Therefore, the administrator must be able to set the MPD for gathering
statistics. An observer may make raw packet headers available for analysis to
other systems. Observers may contain lists that limit the number of hosts for
which to gather statistics. This is not very different from the way Diffserv
determines which microflows to process or not.</t>
        <t>A speciality for observers is that they cannot be certain that all packets
that are not lost, pass the system. Therefore, care must be taken when
calculating statistics. For example, a loss statistic may say more about the
fraction of microflow packets passing a system than on the actual loss. With
timestamps and an ID, such fractions can even be detected with high
certainty.</t>
        <t>By means of the MO an observer can calculate all statistics that a
destination host can. It would be possible to introduce additional metrics
that are specifically tuned for observers. For example, metrics that only
take largely complete sets of packets to calculate losses, reordering and
duplication.</t>
        <t>The following properties can at least be observed with the standard metrics:
- Fraction of packets passing the observer.
- One-way Delay and related statistics from source to observer.
- Packet reordering and duplicates on consecutive sequences of packets.</t>
        <t>For a full set of observers, one could extend the measurement scheme by
sending the MO and observer RTS to an external measurement system. Such an
external system can then calculate more than the individual host. The raw
data that these systems must transmit to enable this are those the
destination host transmits.</t>
      </section>
      <section anchor="metrics-and-measurement-protocols">
        <name>Metrics and Measurement protocols</name>
        <t>The NUM+TTS information is used to generate statistics on the One-way packet
loss, the one-way packet reordering and the one-way packet duplication.
Metrics for these properties can be related to those available in the IP
Performance Metrics (IPPM) framework <xref target="RFC2330"/>, <xref target="RFC7680"/>. The same holds
for Delay based metrics <xref target="RFC7679"/>, <xref target="RFC3393"/>. On the other hand, the metrics
could be taken from the Ethernet specifications <xref target="MEF10.4"/>. This framework
seems to be more mature at the moment.</t>
        <t>When the destination host makes the MO option and necessary information for
metric determination available to the user space. Advanced metric
calculations must not take place in kernel space and user space programs can
be used to make measurement data available according to one or more sets of
metrics, or may even send the raw data off to a storage server for later
processing. The idea that information can be available in real-time must not
be followed since the MPD must always be observed.</t>
        <t>To send measurement statistics to an overarching data collection system,
protocols like RMON <xref target="RFC2819"/> and its extensions or IPFIX <xref target="RFC7011"/> can be
used or extended.</t>
      </section>
      <section anchor="notes-for-systems-with-real-time-protocols">
        <name>Notes for systems with real-time protocols</name>
        <t>For systems relying on real-time protocols in the network an MPD of 120
seconds, or even 10 seconds, may be way to long. Depending on the criticality
of knowing the network performance near real time, the MPD on sockets
involved, can be set much lower, e.g. 1 second. This is based on the fact
that packets that have longer delay have no meaning anymore for such
protocols and are deemed lost.</t>
      </section>
      <section anchor="notes-for-raw-metering-data-protocols">
        <name>Notes for raw metering data protocols</name>
        <t>When sending raw data to an analysis system for full system analysis the
following must be included in a data unit per measured packet. Such a feature
can, of course, only be used when the network has sufficient capacity left to
send this additional data. A protocol specification is left to the
implementer.</t>
        <t>One data unit would contain a flow identification <xref target="RFC6437"/> consisting of:</t>
        <ul spacing="normal">
          <li>
            <t>source IP address (32 or 128 bit)</t>
          </li>
          <li>
            <t>destination IP address (32 or 128 bit)</t>
          </li>
          <li>
            <t>flow ID (20 bit)
or, when it occupies less bits, a hash (e.g. for IPv6), and measurement data:</t>
          </li>
          <li>
            <t>NUM field (16 bit)</t>
          </li>
          <li>
            <t>TTS nanosecond counter (32 bit)</t>
          </li>
          <li>
            <t>TTS second counter (12/16 bit)</t>
          </li>
          <li>
            <t>RTS nanosecond counter (32 bit)</t>
          </li>
          <li>
            <t>RTS second counter (12/16 bit)</t>
          </li>
        </ul>
        <t>for IPv4 this is a total of 188 bits. For IPv6 this could be 160-bit for a
flow hash (e.g. SHA1) and 104-bit for the measurement data (264 bit). It is
proposed that source hosts set the RTS fields to 0.</t>
        <t>Multiple data units can be packed in one IP packet for the measurement system
A specification for such a protocol can be created when needed. This could
include the traditional Diffserv ports + protocol for IPv4 for non-MO enabled
measurements.</t>
        <t>A consideration could be to include in these data the following data for the
observer transmission time:</t>
        <ul spacing="normal">
          <li>
            <t>ONUM field (16 bit)</t>
          </li>
          <li>
            <t>OTTS nanosecond counter (32 bit)</t>
          </li>
          <li>
            <t>OTTS second counter (12 bit)</t>
          </li>
        </ul>
        <t>where ONUM is the observer NUM field at transmission, and OTTS is the
observer transmission time stamp. This would allow to separate wire and
system time for an observer.</t>
        <t>Alternatively, packets can almost always be identified based on a hash. Hash
based measurement methods <xref target="RFC7014"/> would nevertheless need to send at least
the timestamps in order to determine the system delays for packets. It is
therefore not necessarily cheaper (bit and computation wise) to use a hash
based measurement approach.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security measures were considered during the design of the IP option, but,
especially in the case of the IPv4 measurement option, possibilities are
limited due to the limited available space in the IPv4 header. Nevertheless,
dropping of the IP measurement option cannot be prevented by the end-hosts.</t>
      <t>As an alternative to real security measures, it is also possible to share
information on how to obfuscate the measurement option information for third
parties. The timestamps and NUM fields may be manipulated by a PRNG of
sufficient strength to make systems on the packet path that are not in the
owner's hand, guess about the true values. The systems owned by the entity
doing the measurements, can share the seeds of the PRNGs, and regularly update
these, using out of band securely encrypted channels.</t>
      <t>It must be considered that, with current network systems, data can be recorded
in abundance, and that obfuscating algorithms may be broken quickly, allowing
the third party to at least read the data in the IP measurement option.</t>
      <t>However, the author of this RFC would not endorse such a method as secure.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests two IP option numbers to be registered by IANA.</t>
      <t>Option Type: 8 bits</t>
      <ul empty="true">
        <li>
          <t>The IP measurement option is a debugging and measurement option, and must be
present in each fragment of an IP datagram carrying the IP measurement
option. Two option types are requested, one for non-encrypted options,
with or without signature, and one for encrypted options, that can only be
read by systems on the path that belong to the trusted group of measurement
clients.</t>
          <ul spacing="normal">
            <li>
              <t>Bit      8 (copied flag): 1 = copied</t>
            </li>
            <li>
              <t>Bit    6-7 (option class: 2 = debugging and measurement</t>
            </li>
            <li>
              <t>Bits 1-5 (option number): 26 = Unencrypted Measurement Option (UMO),
                                            to be assigned by IANA</t>
            </li>
            <li>
              <t>Bits 1-5 (option number): 27 = Encrypted Measurement Option (EMO),
                                            to be assigned by IANA</t>
            </li>
          </ul>
          <t>This means values 218 and 219</t>
        </li>
      </ul>
      <t>It depends on the IANA policy if the option number for encrypted options
should already be reserved, since there is no current implementation of it
and the IP option registry space is very limited.</t>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>An IPv4 and IPv6 option was introduced that is flexible enough to support
various measurement schemes on various types of IP traffic. Although it ads
to the length of the IP packet, it can be used to measure traffic in
situations where full statistics are needed (e.g., systems with stringent
SLS requirements on delay and packet loss) and bandwidth is not the limitation
for applications.</t>
      <t>Measurement procedures and relevant metrics are to be discussed in companion
RFCs.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC791">
          <front>
            <title>Internet Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
          <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
            <front>
              <title>Key words for use in RFCs to Indicate Requirement Levels</title>
              <author fullname="S. Bradner" initials="S." surname="Bradner"/>
              <date month="March" year="1997"/>
              <abstract>
                <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          </reference>
          <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
            <front>
              <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
              <author fullname="B. Leiba" initials="B." surname="Leiba"/>
              <date month="May" year="2017"/>
              <abstract>
                <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          </reference>
        </referencegroup>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1122">
          <front>
            <title>Requirements for Internet Hosts - Communication Layers</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <date month="October" year="1989"/>
            <abstract>
              <t>This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="3"/>
          <seriesInfo name="RFC" value="1122"/>
          <seriesInfo name="DOI" value="10.17487/RFC1122"/>
        </reference>
        <reference anchor="RFC2330">
          <front>
            <title>Framework for IP Performance Metrics</title>
            <author fullname="V. Paxson" initials="V." surname="Paxson"/>
            <author fullname="G. Almes" initials="G." surname="Almes"/>
            <author fullname="J. Mahdavi" initials="J." surname="Mahdavi"/>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <date month="May" year="1998"/>
            <abstract>
              <t>The purpose of this memo is to define a general framework for particular metrics to be developed by the IETF's IP Performance Metrics effort. This memo provides information for the Internet community. It does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2330"/>
          <seriesInfo name="DOI" value="10.17487/RFC2330"/>
        </reference>
        <reference anchor="RFC2474">
          <front>
            <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
            <author fullname="K. Nichols" initials="K." surname="Nichols"/>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2474"/>
          <seriesInfo name="DOI" value="10.17487/RFC2474"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC2819">
          <front>
            <title>Remote Network Monitoring Management Information Base</title>
            <author fullname="S. Waldbusser" initials="S." surname="Waldbusser"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing remote network monitoring devices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="59"/>
          <seriesInfo name="RFC" value="2819"/>
          <seriesInfo name="DOI" value="10.17487/RFC2819"/>
        </reference>
        <reference anchor="RFC3168">
          <front>
            <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
            <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3168"/>
          <seriesInfo name="DOI" value="10.17487/RFC3168"/>
        </reference>
        <reference anchor="RFC3393">
          <front>
            <title>IP Packet Delay Variation Metric for IP Performance Metrics (IPPM)</title>
            <author fullname="C. Demichelis" initials="C." surname="Demichelis"/>
            <author fullname="P. Chimento" initials="P." surname="Chimento"/>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3393"/>
          <seriesInfo name="DOI" value="10.17487/RFC3393"/>
        </reference>
        <reference anchor="RFC4656">
          <front>
            <title>A One-way Active Measurement Protocol (OWAMP)</title>
            <author fullname="S. Shalunov" initials="S." surname="Shalunov"/>
            <author fullname="B. Teitelbaum" initials="B." surname="Teitelbaum"/>
            <author fullname="A. Karp" initials="A." surname="Karp"/>
            <author fullname="J. Boote" initials="J." surname="Boote"/>
            <author fullname="M. Zekauskas" initials="M." surname="Zekauskas"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>The One-Way Active Measurement Protocol (OWAMP) measures unidirectional characteristics such as one-way delay and one-way loss. High-precision measurement of these one-way IP performance metrics became possible with wider availability of good time sources (such as GPS and CDMA). OWAMP enables the interoperability of these measurements. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4656"/>
          <seriesInfo name="DOI" value="10.17487/RFC4656"/>
        </reference>
        <reference anchor="RFC5357">
          <front>
            <title>A Two-Way Active Measurement Protocol (TWAMP)</title>
            <author fullname="K. Hedayat" initials="K." surname="Hedayat"/>
            <author fullname="R. Krzanowski" initials="R." surname="Krzanowski"/>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <author fullname="K. Yum" initials="K." surname="Yum"/>
            <author fullname="J. Babiarz" initials="J." surname="Babiarz"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>The One-way Active Measurement Protocol (OWAMP), specified in RFC 4656, provides a common protocol for measuring one-way metrics between network devices. OWAMP can be used bi-directionally to measure one-way metrics in both directions between two network elements. However, it does not accommodate round-trip or two-way measurements. This memo specifies a Two-Way Active Measurement Protocol (TWAMP), based on the OWAMP, that adds two-way or round-trip measurement capabilities. The TWAMP measurement architecture is usually comprised of two hosts with specific roles, and this allows for some protocol simplifications, making it an attractive alternative in some circumstances. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5357"/>
          <seriesInfo name="DOI" value="10.17487/RFC5357"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC6437">
          <front>
            <title>IPv6 Flow Label Specification</title>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Jiang" initials="S." surname="Jiang"/>
            <author fullname="J. Rajahalme" initials="J." surname="Rajahalme"/>
            <date month="November" year="2011"/>
            <abstract>
              <t>This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods. Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of the scope for this document.</t>
              <t>The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6437"/>
          <seriesInfo name="DOI" value="10.17487/RFC6437"/>
        </reference>
        <reference anchor="RFC6621">
          <front>
            <title>Simplified Multicast Forwarding</title>
            <author fullname="J. Macker" initials="J." role="editor" surname="Macker"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document describes a Simplified Multicast Forwarding (SMF) mechanism that provides basic Internet Protocol (IP) multicast forwarding suitable for limited wireless mesh and mobile ad hoc network (MANET) use. It is mainly applicable in situations where efficient flooding represents an acceptable engineering design trade-off. It defines techniques for multicast duplicate packet detection (DPD), to be applied in the forwarding process, for both IPv4 and IPv6 protocol use. This document also specifies optional mechanisms for using reduced relay sets to achieve more efficient multicast data distribution within a mesh topology as compared to Classic Flooding. Interactions with other protocols, such as use of information provided by concurrently running unicast routing protocols or interaction with other multicast protocols, as well as multiple deployment approaches are also described. Distributed algorithms for selecting reduced relay sets and related discussion are provided in the appendices. Basic issues relating to the operation of multicast MANET border routers are discussed, but ongoing work remains in this area and is beyond the scope of this document. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6621"/>
          <seriesInfo name="DOI" value="10.17487/RFC6621"/>
        </reference>
        <reference anchor="RFC6864">
          <front>
            <title>Updated Specification of the IPv4 ID Field</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>The IPv4 Identification (ID) field enables fragmentation and reassembly and, as currently specified, is required to be unique within the maximum lifetime for all datagrams with a given source address/destination address/protocol tuple. If enforced, this uniqueness requirement would limit all connections to 6.4 Mbps for typical datagram sizes. Because individual connections commonly exceed this speed, it is clear that existing systems violate the current specification. This document updates the specification of the IPv4 ID field in RFCs 791, 1122, and 2003 to more closely reflect current practice and to more closely match IPv6 so that the field's value is defined only when a datagram is actually fragmented. It also discusses the impact of these changes on how datagrams are used. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6864"/>
          <seriesInfo name="DOI" value="10.17487/RFC6864"/>
        </reference>
        <reference anchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC7014">
          <front>
            <title>Flow Selection Techniques</title>
            <author fullname="S. D'Antonio" initials="S." surname="D'Antonio"/>
            <author fullname="T. Zseby" initials="T." surname="Zseby"/>
            <author fullname="C. Henke" initials="C." surname="Henke"/>
            <author fullname="L. Peluso" initials="L." surname="Peluso"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>The Intermediate Flow Selection Process is the process of selecting a subset of Flows from all observed Flows. The Intermediate Flow Selection Process may be located at an IP Flow Information Export (IPFIX) Exporter or Collector, or within an IPFIX Mediator. It reduces the effort of post-processing Flow data and transferring Flow Records. This document describes motivations for using the Intermediate Flow Selection process and presents Intermediate Flow Selection techniques. It provides an information model for configuring Intermediate Flow Selection Process techniques and discusses what information about an Intermediate Flow Selection Process should be exported.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7014"/>
          <seriesInfo name="DOI" value="10.17487/RFC7014"/>
        </reference>
        <reference anchor="RFC7679">
          <front>
            <title>A One-Way Delay Metric for IP Performance Metrics (IPPM)</title>
            <author fullname="G. Almes" initials="G." surname="Almes"/>
            <author fullname="S. Kalidindi" initials="S." surname="Kalidindi"/>
            <author fullname="M. Zekauskas" initials="M." surname="Zekauskas"/>
            <author fullname="A. Morton" initials="A." role="editor" surname="Morton"/>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo defines a metric for one-way delay of packets across Internet paths. It builds on notions introduced and discussed in the IP Performance Metrics (IPPM) Framework document, RFC 2330; the reader is assumed to be familiar with that document. This memo makes RFC 2679 obsolete.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="81"/>
          <seriesInfo name="RFC" value="7679"/>
          <seriesInfo name="DOI" value="10.17487/RFC7679"/>
        </reference>
        <reference anchor="RFC7680">
          <front>
            <title>A One-Way Loss Metric for IP Performance Metrics (IPPM)</title>
            <author fullname="G. Almes" initials="G." surname="Almes"/>
            <author fullname="S. Kalidindi" initials="S." surname="Kalidindi"/>
            <author fullname="M. Zekauskas" initials="M." surname="Zekauskas"/>
            <author fullname="A. Morton" initials="A." role="editor" surname="Morton"/>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo defines a metric for one-way loss of packets across Internet paths. It builds on notions introduced and discussed in the IP Performance Metrics (IPPM) Framework document, RFC 2330; the reader is assumed to be familiar with that document. This memo makes RFC 2680 obsolete.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="82"/>
          <seriesInfo name="RFC" value="7680"/>
          <seriesInfo name="DOI" value="10.17487/RFC7680"/>
        </reference>
        <reference anchor="RFC7799">
          <front>
            <title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This memo provides clear definitions for Active and Passive performance assessment. The construction of Metrics and Methods can be described as either "Active" or "Passive". Some methods may use a subset of both Active and Passive attributes, and we refer to these as "Hybrid Methods". This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7799"/>
          <seriesInfo name="DOI" value="10.17487/RFC7799"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9331">
          <front>
            <title>The Explicit Congestion Notification (ECN) Protocol for Low Latency, Low Loss, and Scalable Throughput (L4S)</title>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This specification defines the protocol to be used for a new network service called Low Latency, Low Loss, and Scalable throughput (L4S). L4S uses an Explicit Congestion Notification (ECN) scheme at the IP layer that is similar to the original (or 'Classic') ECN approach, except as specified within. L4S uses 'Scalable' congestion control, which induces much more frequent control signals from the network, and it responds to them with much more fine-grained adjustments so that very low (typically sub-millisecond on average) and consistently low queuing delay becomes possible for L4S traffic without compromising link utilization. Thus, even capacity-seeking (TCP-like) traffic can have high bandwidth and very low delay at the same time, even during periods of high traffic load.</t>
              <t>The L4S identifier defined in this document distinguishes L4S from 'Classic' (e.g., TCP-Reno-friendly) traffic. Then, network bottlenecks can be incrementally modified to distinguish and isolate existing traffic that still follows the Classic behaviour, to prevent it from degrading the low queuing delay and low loss of L4S traffic. This Experimental specification defines the rules that L4S transports and network elements need to follow, with the intention that L4S flows neither harm each other's performance nor that of Classic traffic. It also suggests open questions to be investigated during experimentation. Examples of new Active Queue Management (AQM) marking algorithms and new transports (whether TCP-like or real time) are specified separately.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9331"/>
          <seriesInfo name="DOI" value="10.17487/RFC9331"/>
        </reference>
        <reference anchor="RFC9332">
          <front>
            <title>Dual-Queue Coupled Active Queue Management (AQM) for Low Latency, Low Loss, and Scalable Throughput (L4S)</title>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This specification defines a framework for coupling the Active Queue Management (AQM) algorithms in two queues intended for flows with different responses to congestion. This provides a way for the Internet to transition from the scaling problems of standard TCP-Reno-friendly ('Classic') congestion controls to the family of 'Scalable' congestion controls. These are designed for consistently very low queuing latency, very low congestion loss, and scaling of per-flow throughput by using Explicit Congestion Notification (ECN) in a modified way. Until the Coupled Dual Queue (DualQ), these Scalable L4S congestion controls could only be deployed where a clean-slate environment could be arranged, such as in private data centres.</t>
              <t>This specification first explains how a Coupled DualQ works. It then gives the normative requirements that are necessary for it to work well. All this is independent of which two AQMs are used, but pseudocode examples of specific AQMs are given in appendices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9332"/>
          <seriesInfo name="DOI" value="10.17487/RFC9332"/>
        </reference>
        <reference anchor="RFC9341">
          <front>
            <title>Alternate-Marking Method</title>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="M. Cociglio" initials="M." surname="Cociglio"/>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="T. Zhou" initials="T." surname="Zhou"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>This document describes the Alternate-Marking technique to perform packet loss, delay, and jitter measurements on live traffic. This technology can be applied in various situations and for different protocols. According to the classification defined in RFC 7799, it could be considered Passive or Hybrid depending on the application. This document obsoletes RFC 8321.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9341"/>
          <seriesInfo name="DOI" value="10.17487/RFC9341"/>
        </reference>
        <reference anchor="IANA-IP-Option-Numbers" target="https://www.iana.org/assignments/ip-parameters/ip-parameters.xhtml#ip-parameters-1">
          <front>
            <title>IP Option Numbers</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IEEE802.3">
          <front>
            <title>IEEE Standard for Ethernet</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2022" month="May"/>
          </front>
        </reference>
        <reference anchor="IEEE1588-2019">
          <front>
            <title>IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2019" month="November"/>
          </front>
        </reference>
        <reference anchor="MEF10.4">
          <front>
            <title>Subscriber Ethernet Service Attributes</title>
            <author>
              <organization>Metro Ethernet Forum</organization>
            </author>
            <date year="2018" month="December"/>
          </front>
        </reference>
        <reference anchor="Nokia" target="https://www.nokia.com/about-us/news/releases/2020/03/13/nokia-bell-labs-world-records-and-innovations-in-fiber-optics-to-enable-faster-and-higher-capacity-5g-networks-of-the-future/">
          <front>
            <title>Noka Bell Labs' world records and innovations in fibre optics to enable faster and higher capacity 5G networks of the future</title>
            <author>
              <organization>Nokia</organization>
            </author>
            <date year="2020" month="March"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1239?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Tjeerd Pinkert wants to thank Gert Bolz, and Benjamin Schilling for their
support of the hybrid network measurements innovation project, and Sascha
Liebscher, Achim Willers, Tobias Grosch, and Jaime Lazaro Calderon for their
support to make this work possible within Siemens Mobility.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Benjamin Schilling">
        <organization>Siemens Mobility GmbH</organization>
        <address>
          <postal>
            <street>Ackerstrasse 22</street>
            <city>Braunschweig</city>
            <code>38126</code>
            <country>Germany</country>
          </postal>
          <email>benjamin.schilling@siemens.com</email>
          <uri>https://www.mobility.siemens.com</uri>
        </address>
      </contact>
      <contact fullname="Gert Bolz">
        <organization>Siemens Mobility GmbH</organization>
        <address>
          <postal>
            <street>Ackerstrasse 22</street>
            <city>Braunschweig</city>
            <code>38126</code>
            <country>Germany</country>
          </postal>
          <email>gert.bolz@siemens.com</email>
          <uri>https://www.mobility.siemens.com</uri>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
